Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
forms computing » form computing, formulas computing, forms conducting
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
forms computing » form computing, formulas computing, forms conducting
securing https » security https, security http, securing rtp
1
by Hajek, Petr., Hajek, Petr., Montesinos Santalucia, Vicente., Vanderwerff, Jon., Zizler, Vaclav.
Published 2008
Subjects:
“...Computer security....”Published 2008
View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“...ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A...”View full text
Electronic
eBook
3
Published 2015
Table of Contents:
“..., Philanthropy, and Human Security: Concepts, and Contexts- Samiul Hasan -- Chapter 2: Human Security in A...”View full text
Electronic
eBook
4
Subjects:
“...Computational Intelligence. https://scigraph.springernature.com/ontologies/product-market-codes...”
View full text
View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“...-Offs in Secure Computation -- Federated Identity Management -- Accountable Anonymous Communication...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Decentralized Model for Multi-Attribute Negotiations with Incomplete Information and General Utility Functions...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“... Compute Units -- Relationship-Preserving Change Propagation in Process Ecosystems -- Scheduling Service...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“...Power Aware Computing -- Real-Time Loop Scheduling with Energy Optimization Via DVS and ABB...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Initialisation Method with Selection of Weights on the Basis of the Function Variability -- Soft Committee...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... of the Metric Deadline TSP -- On the Shortest Linear Straight-Line Program for Computing Linear Forms -- Flip...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Services for Closed-Form Analysis of Their Performance and Reliability Bottlenecks -- SLA-Based Advance...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... Probabilistic Neural Network -- Passivity Analysis of BAM NNs with Mixed Time Delays -- Soft Computing -- A...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... -- Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation -- Security...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“...Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal...”View full text
Electronic
eBook
20
Published 2012
Table of Contents:
“... and Signatures -- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption -- Computing...”View full text
Electronic
eBook



